FacebookTwitterGoogle+RedditEmail

As the Surveillance Expands, Best Way to Resist is to Bury the NSA in Garbage

Word that Yahoo! last year, at the urging of the National Security Agency, secretly developed a program that monitored the mail of all 280 million of its customers and turned over to the NSA all mail from those who used any of the agency’s thousands of keywords, shows that the US has become a total police state in terms of trying to monitor every person in the country (and outside too).

With the courts, especially at the appellate and Supreme Court level, rolling over and supporting this massive evisceration of basic freedoms, including the First Amendment guarantee of freedom of speech and the Fourth Amendment protection against illegal search and seizure and invasion of privacy, perhaps the best way for us to fight back is to overload the spy system. How to do this? Just copy and paste random fragments of the following list (a bit dated, but useable), provided courtesy of the publication Business Insider, and include them in every communication — email, social media, etc. — that you send out.

The secret Yahoo! assault (reported on here by Alfredo Lopez in yesterday’s article), works by searching users’ emails for keywords on an NSA list of suspected words that might be used by alleged terrorists or anti-government activists, and then those suspect communications are forwarded to the NSA, where humans eventually have to separate the wheat from the chaff. Too much chaff (and they surely have too much chaff anyhow!) and they will be buried with work and unable to read anything.

In fact, critics of the government’s metastasizing universal surveillance program, including former FBI agents and other experts, have long criticized the effort to turn the US into a replica of East Germany with its Stazi secret police, cannot work and is actually counter-productive, because with spy agencies’ limited manpower looking at all the false leads provided by keyword monitoring, they are bound to miss the real dangerous messages. In fact, this was also the argument used against the FBI’s program of monitoring mosques and suspecting every Muslim American who expressed criticism of the US. Most are just people saying what a lot of us say: that the US wars in the Middle East are wrong or even criminal, but they are just citizens or immigrants exercising their free speech when they do this, not terrorists, and spying on them is and has been a huge waste or time and resources.

So, to help destroy the continuing and expanding effort to monitor everything we do, here’s a sample of the NSA’s keyword list:

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

***

 You’ll note, if you read through it, that the list itself is doing the job of overburdening the NSA’s staff. By including such commonly used words as flu, package, face, niche, package, credit card, fraud, basement, veggie (!), president, freedom (!), bank and Armani, they assure that there will be endless piles of communications that are completely innocuous that will have to be first read and examined for signs of terrorism. You’ll note too that there are some keywords that are even misspelled, meaning that the real words will be missed, for example: assassinate, priavacy(!), Secert Service and Hillal (is that supposed to be halal or Hillel I wonder?).

It’s also interesting to discover among the incriminating words that the NSA thinks might be used by potential “terrorists,” peculiar words like: freedom, veggie, sardine, Standford (sic), advisors, halibut, fish, Bubba the Love Sponge (really!), Playboy, dictionary and Zen (I’m sure there’s a great SNL skit in the works featuring a gang of Zen practitioners plotting their first terrorist action!).

Anyhow, have fun reading the list and selecting some of these choice keywords to sprinkling into your communications. Or you could just use them as a tag line to your emails, the way some people add inspirational sayings from the likes of Ben Franklin or Albert Einstein. Since the keyword list is so inclusive, you’re probably having your mail reviewed anyway, but why not make sure it is, just to keep the NSA occupied.

More articles by:

Dave Lindorff is a founding member of ThisCantBeHappening!, an online newspaper collective, and is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press).

Weekend Edition
September 21, 2018
Friday - Sunday
Alexandra Isfahani-Hammond
Hurricane Florence and 9.7 Million Pigs
Andrew Levine
Israel’s Anti-Semitism Smear Campaign
Paul Street
Laquan McDonald is Being Tried for His Own Racist Murder
Brad Evans
What Does It Mean to Celebrate International Peace Day?
Nick Pemberton
With or Without Kavanaugh, The United States Is Anti-Choice
Jim Kavanagh
“Taxpayer Money” Threatens Medicare-for-All (And Every Other Social Program)
Jonathan Cook
Palestine: The Testbed for Trump’s Plan to Tear up the Rules-Based International Order
Jeffrey St. Clair
Roaming Charges: the Chickenhawks Have Finally Come Back Home to Roost!
David Rosen
As the Capitalist World Turns: From Empire to Imperialism to Globalization?
Jonah Raskin
Green Capitalism Rears Its Head at Global Climate Action Summit
James Munson
On Climate, the Centrists are the Deplorables
Robert Hunziker
Is Paris 2015 Already Underwater?
Arshad Khan
Will Their Ever be Justice for Rohingya Muslims?
Jill Richardson
Why Women Don’t Report Sexual Assault
Dave Clennon
A Victory for Historical Accuracy and the Peace Movement: Not One Emmy for Ken Burns and “The Vietnam War”
W. T. Whitney
US Harasses Cuba Amid Mysterious Circumstances
Nathan Kalman-Lamb
Things That Make Sports Fans Uncomfortable
George Capaccio
Iran: “Snapping Back” Sanctions and the Threat of War
Kenneth Surin
Brexit is Coming, But Which Will It Be?
Louis Proyect
Moore’s “Fahrenheit 11/9”: Entertaining Film, Crappy Politics
Ramzy Baroud
Why Israel Demolishes: Khan Al-Ahmar as Representation of Greater Genocide
Ben Dangl
The Zapatistas’ Dignified Rage: Revolutionary Theories and Anticapitalist Dreams of Subcommandante Marcos
Ron Jacobs
Faith, Madness, or Death
Bill Glahn
Crime Comes Knocking
Terry Heaton
Pat Robertson’s Hurricane “Miracle”
Dave Lindorff
In Montgomery County PA, It’s Often a Jury of White People
Louis Yako
From Citizens to Customers: the Corporate Customer Service Culture in America 
William Boardman
The Shame of Dianne Feinstein, the Courage of Christine Blasey Ford 
Ernie Niemi
Logging and Climate Change: Oregon is Appalachia and Timber is Our Coal
Jessicah Pierre
Nike Says “Believe in Something,” But Can It Sacrifice Something, Too?
Paul Fitzgerald - Elizabeth Gould
Weaponized Dreams? The Curious Case of Robert Moss
Olivia Alperstein
An Environmental 9/11: the EPA’s Gutting of Methane Regulations
Ted Rall
Why Christine Ford vs. Brett Kavanaugh is a Train Wreck You Can’t Look Away From
Lauren Regan
The Day the Valves Turned: Defending the Pipeline Protesters
Ralph Nader
Questions, Questions Where are the Answers?
Binoy Kampmark
Deplatforming Germaine Greer
Raouf Halaby
It Should Not Be A He Said She Said Verdict
Robert Koehler
The Accusation That Wouldn’t Go Away
Jim Hightower
Amazon is Making Workers Tweet About How Great It is to Work There
Robby Sherwin
Rabbi, Rabbi, Where For Art Thou Rabbi?
Vern Loomis
Has Something Evil This Way Come?
Steve Baggarly
Disarm Trident Walk Ends in Georgia
Graham Peebles
Priorities of the Time: Peace
Michael Doliner
The Department of Demonization
David Yearsley
Bollocks to Brexit: the Plumber Sings
FacebookTwitterGoogle+RedditEmail